A VPN-capable router is a convenient device — it provides VPN connections to all your computers and mobile devices. You won’t have to install a VPN client on each device, all those connected devices count as one connection with your VPN provider.

Security researchers have revealed new details about the censorship features in North Korea’s homegrown operating system, Red Star OS, which monitors the files people store on their computer and traces them back to their source. Red Star OS is an operating developed by the North Korean government for use by the country’s citizens. It is based on Fedora Linux but …

The Tor project recently released the first version of its “hardened” Tor browser package. This release comes with extra security features designed to provide more privacy and protection against attacks. The Tor browser is a special Web browser package that makes it easy to connect to the Tor network. It is designed to be portable and self-contained, meaning you can …

Keeping your data private while online is one thing, but how do you protect data on old computers or disks after they’re no longer in use? Eraser, an open source data destruction tool, provides a solution. Contrary to popular belief, “deleting” files from your computer doesn’t make them go away forever. In most cases, file deletion simply removes information from …